Label's Verification Technology of Gateway Based on Trusted Label

Article Preview

Abstract:

Trusted Network is a new research direction of the Internet. On the basis of trusted LAN, this study puts forward a trusted label of the trusted terminal, which can solve the DDOS attack efficiently and control the abnormal flow easily in the trusted LAN. In addition, it proposes the label’s verification technology, so as to ensure the execution efficiency of some real-time business in the gateway. Above all, the trusted label and the verification technology make the LAN more controllable and safer.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

461-464

Citation:

Online since:

June 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Trusted Computing Group. TCG Specification Architecture Overview, Revision 1. 4[Z]. August (2007).

Google Scholar

[2] Trusted Computing Group. TPM Specification v1. 2[Z]. March (2006).

Google Scholar

[3] Yan Xiguang. The research and development of the trusted computing. Information security and communication security [J]. 2006(11): 18-20.

Google Scholar

[4] http: /csrc. nist. gov/publications/fips/fips198-1/FIPS-198-1_final. pdf.

Google Scholar

[5] http: /www. oscca. gov. cn/UpFile/File64. PDF.

Google Scholar